The Custom Post Type UI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'label' parameter during custom post type import in all versions up to, and including, 1.18.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the Tools → Get Code page.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webdevstudios
Webdevstudios custom Post Type Ui Wordpress Wordpress wordpress |
|
| Vendors & Products |
Webdevstudios
Webdevstudios custom Post Type Ui Wordpress Wordpress wordpress |
Sat, 13 Dec 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Custom Post Type UI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'label' parameter during custom post type import in all versions up to, and including, 1.18.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses the Tools → Get Code page. | |
| Title | Custom Post Type UI <= 1.18.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'label' Import Parameter | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-15T15:49:09.743Z
Reserved: 2025-12-04T17:52:11.237Z
Link: CVE-2025-14056
Updated: 2025-12-15T15:43:57.885Z
Status : Awaiting Analysis
Published: 2025-12-13T16:16:47.900
Modified: 2025-12-15T18:22:13.783
Link: CVE-2025-14056
No data.
OpenCVE Enrichment
Updated: 2025-12-14T21:14:46Z